February 13, 2018 Edition
View this email in your browser
6 Ways to Relieve
6 Ways to Relieve “Security Fatigue”

A study from the National Institute of Standards and Technology (NIST) found that 63 percent of participants have experienced “security fatigue,” defined as “a weariness or reluctance to deal with computer security.”

Cybersecurity: What Does the Board Want and Need?
Board members are under pressure from all sides to keep data and business operations safe from cyber attack.
5 ways Industry 4.0 impacts the supply chain
The fourth industrial revolution is changing the game for manufacturers who make the investment in innovative digital technologies.
GDPR - A Game-Changing Opportunity for Data Processors and Controllers
The EU isn't sitting back when it comes to the theft of personal data. To fight back, the EU has passed GDPR (General Data Protection Regulation), a single set of standards to protect the personal data and privacy of all EU citizens.
Finding Evil: Why Managed Detection and Response Zeroes In On the Endpoint
Whether an attack on your company starts by stealing cloud service credentials, or exploiting a vulnerability on a misconfigured, internet-facing asset, compromising an internal asset is a great milestone for an intruder.
Copyright © 2018 Cybersecurity Journal. All Rights Reserved.
280 Hillside Ave, Needham, MA 02494